US20040187005A1 - Method and system for marking digital content - Google Patents
Method and system for marking digital content Download PDFInfo
- Publication number
- US20040187005A1 US20040187005A1 US10/392,627 US39262703A US2004187005A1 US 20040187005 A1 US20040187005 A1 US 20040187005A1 US 39262703 A US39262703 A US 39262703A US 2004187005 A1 US2004187005 A1 US 2004187005A1
- Authority
- US
- United States
- Prior art keywords
- digital content
- recipient
- piece
- digital
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims description 57
- 230000004044 response Effects 0.000 claims abstract description 7
- 230000008569 process Effects 0.000 claims description 17
- 230000015654 memory Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 description 7
- 230000006835 compression Effects 0.000 description 4
- 238000007906 compression Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000002716 delivery method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00282—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in the content area, e.g. program area, data area or user area
- G11B20/00289—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in the content area, e.g. program area, data area or user area wherein the key is stored as a watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/103—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91335—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark
Definitions
- the present invention relates to the field of digital content distribution. More specifically, embodiments of the present invention are directed to a method for marking a piece of digital content and the recipient of that piece of digital content.
- Digital media offer several advantages over analog media such as high quality, easy editing, and high fidelity copying.
- digital electronic devices are increasingly popular with consumers.
- the ease with which high quality copies of digital information can be duplicated and distributed has led to the development of a variety of tools for the protection of intellectual property rights.
- Digital watermarking is a process that adds data, called a watermark, into a digital object such that the watermark can later be extracted or detected to make an assertion about the object.
- Digital watermarking is frequently used to identify a copyright holder or to verify the integrity of a digital object.
- the Internet is increasingly being used as a distribution medium for entertainment content such as movies, music, or other multi-media presentations.
- entertainment content such as movies, music, or other multi-media presentations.
- digital content e.g., a movie
- systems having sufficient computing capacity to provide an acceptable level of real-time streaming video performance have proven to be too expensive for most users.
- Internet capacity for providing wide scale delivery of streaming video content is, at this time, insufficient.
- content providers typically rent the content to end users for a specified time period and allow the end users to store the content upon their personal computers so that they can access the digital content later.
- it is desirable that such a method includes security measures to protect against removing the embedded information from the piece of digital content.
- a request for a piece of digital content is received.
- a datum is embedded in an equivalent piece of digital content that identifies the recipient.
- the equivalent piece of digital content is then delivered to the recipient.
- the following example shows how an embodiment of the present invention may be used to implement marking a piece of digital content in accordance with embodiments of the present invention.
- An end user orders a piece of digital content from a content provider that will be downloaded via the Internet into the recipient's computer.
- the identity of the recipient is established by using a digital certificate that is issued by a trusted certificate authority.
- the content provider embeds a digital watermark that identifies the recipient within a copy of the piece of digital content.
- the digital watermark is embedded into a single intra frame (I-frame) of the digital content by re-coding the data contained in that frame.
- the subsequent predicted frames (P-frames) and bi-directional frames (B-frames) that are used in to describe changes in the preceding I-frame are also re-coded and inserted into the copy of the piece of digital content.
- the re-coded frames are then inserted into the piece of digital content to create a piece of digital content that is equivalent to the requested piece of digital content.
- the equivalent piece of digital content comprises the original piece of digital content and the embedded watermark that identifies the recipient.
- the digital watermark can be embedded into the equivalent piece of digital content in such a way that it is not readily detected by the recipient.
- the digital watermark is encrypted using the public key associated with the recipient's digital certificate.
- the equivalent piece of digital content is then delivered to the recipient.
- embodiments of the present invention establish a one to one relationship between a piece of digital content and an end user who is authorized to use that piece of digital content. Furthermore, by not requiring the re-coding of the entire piece of digital content, the present invention facilitates delivery of the digital content to the end user in a timely manner. Finally, the present invention includes security measures that make it more difficult to detect and remove the digital watermark from the piece of digital content.
- FIG. 1 shows an exemplary prior art content distribution system in which digital watermarking is used to identify content.
- FIG. 2 shows an exemplary prior art content distribution system in which digital watermarking is used to identify content.
- FIG. 3 is a block diagram of an exemplary computer system upon which embodiments of the present invention may be utilized.
- FIG. 4 is a flowchart of a method for marking digital content in accordance with embodiments of the present invention.
- FIG. 5 shows an exemplary content distribution system that uses digital watermarking to identify content in accordance with embodiments of the present invention.
- FIG. 6 is a flowchart of a method for marking digital content in accordance with embodiments of the present invention.
- FIG. 1 shows an exemplary prior art content distribution system 100 in which digital watermarking is used to identify content.
- a content provider 110 maintains digital content, for example a movie, in a repository 101 .
- the digital content 102 is distributed via a network 120 , for example a cable network provider, to a plurality of end users (e.g., end users 130 , 140 , 150 , and 160 ).
- the movie is distributed as a digitally encoded signal.
- the signal is received as an input into a set top box (e.g., set top boxes 131 , 141 , 151 , and 161 ) at each of the end user's homes, converted into an analog signal, and output to the end user's television (e.g., televisions 132 , 142 , 152 , and 162 ).
- a set top box e.g., set top boxes 131 , 141 , 151 , and 161
- the set top boxes perform a digital watermarking process upon the content before it is output as an analog signal to the televisions.
- the watermark can be used to determine which user created the unauthorized copy.
- each of the set top boxes may be assigned a unique identification number which is used in the watermarking process to identify the set top box from which unauthorized copies were made.
- neither the content provider nor the network provider watermarks the digital content before sending it to the end users because an identical copy of the content is sent to each end user.
- a watermark added by the content provider 110 or the network provider 120 would be seen at each of the end users' residences and not facilitate identifying the particular end user who created unauthorized copies.
- FIG. 2 shows an exemplary prior art content distribution system 200 in which digital watermarking is used to identify content.
- content provider 210 maintains digital content (e.g., a movie or music) upon repository 201 .
- a piece of digital content 202 undergoes watermark processing 203 prior to releasing the piece of digital content 202 via distributor 220 .
- the piece of digital content is then purchased by end users (e.g., end users 230 , 240 , 250 , and 260 ).
- the piece of digital content 202 may be a movie that is being commercially distributed as a digital versatile disk (DVD).
- the watermarking processing 203 is typically used to differentiate whether an image has been altered or copied without authorization.
- portions of the present invention are comprised of computer-readable and computer-executable instructions that reside, for example, in computer system 300 which is used as a part of a general purpose computer network (not shown). It is appreciated that computer system 300 of FIG. 3 is exemplary only and that the present invention can operate within a number of different computer systems including general-purpose computer systems, embedded computer systems, laptop computer systems, hand-held computer systems, and stand-alone computer systems.
- computer system 300 includes an address/data bus 301 for conveying digital information between the various components, a central processor unit (CPU) 302 for processing the digital information and instructions, a volatile main memory 303 comprised of volatile random access memory (RAM) for storing the digital information and instructions, and a non-volatile read only memory (ROM) 304 for storing information and instructions of a more permanent nature.
- computer system 300 may also include a data storage device 305 (e.g., a magnetic, optical, floppy, or tape drive or the like) for storing vast amounts of data.
- the software program for performing a method for marking digital content of the present invention can be stored either in volatile memory 303 , data storage device 305 , or in an external storage device (not shown).
- Devices which are optionally coupled to computer system 300 include a display device 306 for displaying information to a computer user, an alpha-numeric input device 307 (e.g., a keyboard), and a cursor control device 308 (e.g., mouse, trackball, light pen, etc.) for inputting data, selections, updates, etc.
- Computer system 300 can also include a mechanism for emitting an audible signal (not shown).
- optional display device 306 of FIG. 3 may be a liquid crystal device, cathode ray tube, or other display device suitable for creating graphic images and alpha-numeric characters recognizable to a user.
- Optional cursor control device 308 allows the computer user to dynamically signal the two dimensional movement of a visible symbol (cursor) on a display screen of display device 306 .
- cursor control device 308 are known in the art including a trackball, mouse, touch pad, joystick, or special keys on alpha-numeric input 307 capable of signaling movement of a given direction or manner displacement.
- a cursor can be directed an/or activated via input from alpha-numeric input 307 using special keys and key sequence commands.
- the cursor may be directed and/or activated via input from a number of specially adapted cursor directing devices.
- computer system 300 can include an input/output (I/O) signal unit (e.g., interface) 309 for interfacing with a peripheral device 310 (e.g., a computer network, modem, mass storage device, etc.).
- I/O input/output
- peripheral device 310 e.g., a computer network, modem, mass storage device, etc.
- computer system 300 may be coupled in a network, such as a client/server environment, whereby a number of clients (e.g., personal computers, workstations, portable computers, minicomputers, terminals, etc.) are used to run processes for performing desired tasks (e.g., receiving, embedding, delivering, performing, re-encoding, confirming, encrypting, etc.).
- desired tasks e.g., receiving, embedding, delivering, performing, re-encoding, confirming, encrypting, etc.
- computer system 300 can be coupled in a system for marking digital content.
- FIG. 4 is a flowchart of a method 400 for marking digital content in accordance with embodiments of the present invention.
- FIG. 5 shows an exemplary content distribution system 500 for delivering digital content in accordance with embodiments of the present invention.
- step 410 a request is received to deliver a piece of digital content to a recipient.
- recipient 530 is coupled with a content provider 510 via a network 520 .
- Network 520 is used to convey requests from recipient 530 to the content provider 510 and/or for conveying requested digital content to the recipient 530 .
- the network 520 may comprise an Internet connection, a cable television network provider, a postal network, etc.
- the recipient 530 requests a piece of digital content (e.g., digital content 502 ) via the Internet (e.g., network 520 ).
- Digital certificates are digital documents issued by a certificate authority (e.g., certificate authority 540 of FIG. 5) that establish the credentials of entities doing business or other transactions on an Internet. Digital certificates attest to the binding of a public key, used for encrypting messages and digital signatures, to an individual or other entity.
- the digital certificates typically contain the certificate holder's name, a certificate serial number, expiration dates, a copy of the certificate holder's public key, and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate originated from a trusted party.
- Digital certificates can be kept in registries so that trusted users can look up other users' public keys.
- a trust relationship is established between each recipient (e.g., recipient 530 ) and content provider 510 .
- Certificate authority 540 establishes a known trust with both content provider 510 and with recipient 530 . Because both parties trust certificate authority 540 , an implied trust is established between content provider 510 and the recipient 530 .
- a digital certificate compliant with the X.509 standard is used by certificate authority 540 to establish trust between the recipient 530 and content provider 510 .
- each playback device used by a recipient is issued a separate digital certificate.
- the set top box 531 may be provided with a signed digital certificate when it is manufactured.
- digital certificates can be kept in registries so that authenticating users can look up the other users' public keys.
- content provider 510 maintains a database for associating the digital certificates each of the set top boxes that will be used to access digital content.
- a datum that identifies the recipient 530 is embedded in an equivalent piece of digital content in response to the request.
- the term “equivalent piece of digital content” means a piece of digital content that satisfies a request for digital content.
- the piece of digital content 502 is sent to watermark server 503 .
- the watermark server 503 creates an equivalent piece of digital content (e.g., watermarked content 504 of FIG. 5) comprising a copy of digital content 502 in which a digital watermark that identifies recipient 530 is embedded.
- Watermarking can be described as a process that embeds data called a watermark, digital signature, tag, or label into a multimedia object such that the watermark can be detected or extracted later to make an assertion about the object.
- the embedded digital watermark identifies the particular recipient that will receive the equivalent piece of digital content. Referring to FIG. 5, a digital watermark that is unique to recipient 530 is embedded in a copy of digital content 502 to create watermarked content 504 . Similarly, a different digital watermark is embedded into a copy of digital content 502 that identifies the recipient 550 to create watermarked content 505 .
- a uniquely marked copy of the digital content 502 is created for each recipient. Because the identity of the recipient has been verified by a trusted party (e.g., certificate authority 540 of FIG. 5) the content provider 510 can create a digital watermark that identifies each of the recipients and embed that data within their respective copy of digital content.
- the digital watermark that is embedded into the digital content may be encoded using the public key of the recipient in embodiments of the present invention to hinder efforts to remove the digital watermark from the digital content. Additionally, the digital watermark can be embedded into the digital content such that it is not readily detected by the recipient.
- digital content 502 is video content such as a movie.
- video content such as a movie
- the present embodiment recites video content
- the present invention is well suited to other forms of digital content such as, for example, digital audio content, digital images, and/or digital text.
- a typical digital video stream utilizes a video compression format in compliance with specifications developed by the Moving Picture Expert Group (MPEG).
- MPEG video compression is used in many current and emerging applications such as digital television set-top boxes, digital versatile disks (DVDs), video conferencing, Internet video, high definition television (HDTV) decoders, etc. These applications benefit from video compression in that they require less storage space for archived video information and less bandwidth for the transmission of video information from one point to another.
- MPEG video compression utilizes intra coded frames (I-frames) that comprise a complete picture that do not reference any other frame in the sequence. Following the I-frame is, usually, at least one predicted frame (P-frame) that simply describes changes that have occurred from the preceding frame. In other words, the only data that is stored in a P-frame is the differences between the P-frame and the I-frame it is based upon.
- I-frames intra coded frames
- P-frame predicted frame
- the I-frame contains all of the data that the MPEG decoder needs to render a picture of a ball.
- the subsequent P-frame contains information describing how the position of the ball has changed from the preceding I-frame. Storing differences between frames facilitates substantial reduction in the amount of information needed to reproduce a sequence.
- a P-frame may also be based upon a preceding P-frame.
- a series of frames in an MPEG stream may be described as:
- I represents an I-frame and P represents a P-frame.
- P represents a P-frame.
- P represents a P-frame.
- a bi-directional frame may also be included in the MPEG stream.
- B-frames are coded as differences from the last or the next I or P frame.
- a series of frames in an MPEG stream using B-frames may be described as:
- I represents an I-frame
- P represents a P-frame
- B represents a B-frame. Because no frame is based solely on a B-frame, they do not propagate errors like P-frames.
- the digital watermark is first embedded into an I-frame.
- the subsequent P-frames and B-frames must then be re-coded to account for the changed I-frame.
- Re-coding digital video content is a complicated and time consuming process. This is problematic for a content provider that is trying to deliver digital content using, for example, the Internet because the recipient is expecting a short delay between the time the content is ordered and its delivery.
- a content provider to re-code an entire movie and deliver it in real time over the Internet or a cable television network would require that a content provider invest in a substantial amount of computing hardware.
- digital watermarks are embedded in only a few of the I-frames in the digital content 502 rather than all of them.
- a digital watermark could be embedded in, for example, every 50th I-frame of the MPEG stream. This reduces the amount of re-coding of the digital content that has to be performed, thus reducing the amount of time required to deliver the digital content to a recipient.
- the present invention could, for example, embed a digital watermark in as few as a single I-frame in the MPEG stream if that I-frame is followed by another I-frame that is not watermarked.
- step 430 the equivalent piece of digital content 504 is delivered to the recipient 530 .
- Watermarked content 504 is delivered via the Internet (e.g., network 520 ) to recipient 530 .
- the watermarked content 504 can be delivered to the recipient using a network other than the Internet such as the postal service or a cable television network.
- the watermarked content e.g., watermarked content 504
- the watermarked content 504 is stored using a computer 531 of the recipient 530 who can then replay the content using set top box 531 and television 532 .
- a watermarked content 505 is delivered to the recipient 550 .
- Watermarked content 505 may comprise a copy of the same digital content as watermarked content 504 .
- the digital watermark embedded into watermarked content 505 identifies recipient 550 as the recipient of the content.
- Embodiments of the present invention are advantageous because they facilitate embedding data into a piece of digital content that identifies the recipient of that piece of digital content. Additionally, because only a few of the frames are re-coded with the watermark, the present invention facilitates delivering the digital content to the recipient more quickly than conventional methods. For example, a recipient could request a piece of digital content using a menu displayed upon his/her television (e.g., from their cable television service provider) or computer and receive the piece of digital content in a few minutes. This is not currently possible if every frame in the MPEG stream is re-coded to include the embedded watermark.
- the content provider 510 can identify the recipient of each copy of digital content it distributes, the copyright privileges of content provider 510 are better protected against unauthorized copy and distribution of intellectual property. If content provider 510 later discovers an unauthorized copy of digital content 502 that is being distributed, they can use the digital watermark to identify the recipient of the particular copy of the digital content from which copies were made. For example, content provider 510 can extract the embedded watermark that identifies recipient 530 , determine that recipient 530 is not authorized to copy the digital content, and use this information to prosecute the recipient 530 for unauthorized copying and distribution of digital content 502 .
- FIG. 6 is a flowchart of a method 600 for marking digital content in accordance with embodiments of the present invention.
- a request is received to deliver a piece of digital content to an ultimate recipient of the digital content.
- a recipient e.g., recipient 530 or 550 of FIG. 5
- network 520 comprises the Internet.
- a request for a piece of digital content can be conveyed by a network other than the Internet in embodiments of the present invention.
- the request for digital content also comprises information verifying the identity of the recipient. This may comprise a digital certificate that is substantially compliant with the X.509 standard and is issued by a trusted authenticating party (e.g., certificate authority 540 of FIG. 5).
- a copy of the piece of digital content is created.
- a copy e.g., watermarked content 504 and 505 of FIG. 5
- the digital content e.g., digital content 502 of FIG. 5
- a digital watermark that is embedded within the digital content.
- the digital watermark conveys the identity, which has been verified in step 610 , of the recipient of the copy of the piece of digital content.
- the digital watermark is not readily detectable by the recipient when the copy of the piece of digital content is accessed.
- the digital watermark may be encrypted using the public key of the recipient to hinder efforts to identify and remove the digital watermark.
- the digital watermark is only embedded in a portion of the digital content rather than the entire copy of the piece of digital content. This facilitates delivering the digital content to the recipient more rapidly than conventional distribution systems.
- the digital watermark can be embedded in an I-frame of the digital content and the B-frames and P-frames that immediately follow the watermarked I-frame.
- some fraction of the total number of I-frames e.g., every fiftieth I-frame
- the present invention may utilize as few as a single watermarked i-frame that is immediately followed by another I-frame.
- a copy of the piece of digital content is delivered to the recipient.
- the copy of the piece of digital content e.g., watermarked content 504 and 505 of FIG. 50 is delivered to the recipient.
- the watermarked content is delivered to the recipient using the Internet.
- a delivery method other than the Internet can be used to deliver the copy of the piece of digital content to the recipient as well.
- the present invention is advantageous in that it allows a content provider to embed within a piece of digital content the information identifying an end user who is authorized to access that piece of digital content. Additionally the present invention facilitates delivery of the piece of digital content to the end user in a timely manner. Furthermore, embodiments of the present invention incorporate security measures to protect against removing the embedded information from the piece of digital content.
Abstract
Description
- The present invention relates to the field of digital content distribution. More specifically, embodiments of the present invention are directed to a method for marking a piece of digital content and the recipient of that piece of digital content.
- The protection of intellectual property rights has become increasingly important to the entertainment industry due to the increased use of consumer electronic devices. While these electronic devices have opened new channels of distribution of content (e.g., music, television programming, movies, etc.), they have also increased the possibility of unauthorized copy and distribution of that content. While content providers want to distribute their content to the widest possible audience, they also want to limit access to this content, if possible, to authorized users only. As a result, content providers seek methods for protecting their intellectual property rights that are not excessively inconvenient for authorized end users.
- Digital media offer several advantages over analog media such as high quality, easy editing, and high fidelity copying. As a result, digital electronic devices are increasingly popular with consumers. However, the ease with which high quality copies of digital information can be duplicated and distributed has led to the development of a variety of tools for the protection of intellectual property rights. Digital watermarking is a process that adds data, called a watermark, into a digital object such that the watermark can later be extracted or detected to make an assertion about the object. Digital watermarking is frequently used to identify a copyright holder or to verify the integrity of a digital object.
- The process for digitally watermarking a movie requires a substantial amount of computer processing. Typically, each frame in a piece of digital content is watermarked to provide the greatest amount of copyright protection to a digital content provider. Because this is a lengthy process, performing the watermarking process upon the piece of digital content may require a substantial allocation of time and/or computing resources. Another shortcoming of conventional watermark processing is that it is difficult for content providers to identify end users who violate the content providers' copyright privileges.
- The Internet is increasingly being used as a distribution medium for entertainment content such as movies, music, or other multi-media presentations. At one time, it was predicted that a user would be able to order digital content (e.g., a movie) over the Internet and have it streamed in real-time to their computer. However, systems having sufficient computing capacity to provide an acceptable level of real-time streaming video performance have proven to be too expensive for most users. Additionally, Internet capacity for providing wide scale delivery of streaming video content is, at this time, insufficient. In order to allow distribution of digital content over the Internet, content providers typically rent the content to end users for a specified time period and allow the end users to store the content upon their personal computers so that they can access the digital content later.
- Unfortunately, storing digital content upon a user's computer facilitates unauthorized distribution of copies of copyrighted material. For example, a user can easily copy the digital content and inappropriately distribute it over the Internet. Even if the content is encrypted, it can still be stored by the end user. Additionally, to some degree, all encryption is fallible and does not guarantee that an end user could not eventually decrypt, copy, and distribute the content. This could potentially cause copyright holders to lose revenue. Recent court cases show that the entertainment industry is intent upon preventing unauthorized access and copying of their property. At the same time, they want to facilitate distribution of their content to as wide an audience as possible. Therefore, copyright holders are looking for methods of delivering high quality content over the Internet that still protect their copyright privileges.
- Accordingly, a need exists for a method that allows a content provider to embed within a piece of digital content the information identifying an end user who is authorized to access that piece of digital content. An additional need exists for a method that, while meeting the above stated need, facilitates delivery of the piece of digital content to the end user in a timely manner. Furthermore, while meeting the above stated needs, it is desirable that such a method includes security measures to protect against removing the embedded information from the piece of digital content.
- In one embodiment of the present invention, a request for a piece of digital content is received. In response to the request, a datum is embedded in an equivalent piece of digital content that identifies the recipient. The equivalent piece of digital content is then delivered to the recipient.
- The following example shows how an embodiment of the present invention may be used to implement marking a piece of digital content in accordance with embodiments of the present invention. An end user orders a piece of digital content from a content provider that will be downloaded via the Internet into the recipient's computer. The identity of the recipient is established by using a digital certificate that is issued by a trusted certificate authority. The content provider, embeds a digital watermark that identifies the recipient within a copy of the piece of digital content. The digital watermark is embedded into a single intra frame (I-frame) of the digital content by re-coding the data contained in that frame. The subsequent predicted frames (P-frames) and bi-directional frames (B-frames) that are used in to describe changes in the preceding I-frame are also re-coded and inserted into the copy of the piece of digital content. The re-coded frames are then inserted into the piece of digital content to create a piece of digital content that is equivalent to the requested piece of digital content. The equivalent piece of digital content comprises the original piece of digital content and the embedded watermark that identifies the recipient. The digital watermark can be embedded into the equivalent piece of digital content in such a way that it is not readily detected by the recipient. In one embodiment, the digital watermark is encrypted using the public key associated with the recipient's digital certificate. The equivalent piece of digital content is then delivered to the recipient.
- Thus, embodiments of the present invention establish a one to one relationship between a piece of digital content and an end user who is authorized to use that piece of digital content. Furthermore, by not requiring the re-coding of the entire piece of digital content, the present invention facilitates delivery of the digital content to the end user in a timely manner. Finally, the present invention includes security measures that make it more difficult to detect and remove the digital watermark from the piece of digital content.
- The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the present invention and, together with the description, serve to explain the principles of the invention. Unless specifically noted, the drawings referred to in this description should be understood as not being drawn to scale.
- FIG. 1 shows an exemplary prior art content distribution system in which digital watermarking is used to identify content.
- FIG. 2 shows an exemplary prior art content distribution system in which digital watermarking is used to identify content.
- FIG. 3 is a block diagram of an exemplary computer system upon which embodiments of the present invention may be utilized.
- FIG. 4 is a flowchart of a method for marking digital content in accordance with embodiments of the present invention.
- FIG. 5 shows an exemplary content distribution system that uses digital watermarking to identify content in accordance with embodiments of the present invention.
- FIG. 6 is a flowchart of a method for marking digital content in accordance with embodiments of the present invention.
- Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings. While the present invention will be described in conjunction with the following embodiments, it will be understood that they are not intended to limit the present invention to these embodiments alone. On the contrary, the present invention is intended to cover alternatives, modifications, and equivalents which may be included within the spirit and scope of the present invention as defined by the appended claims. Furthermore, in the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, embodiments of the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as not to unnecessarily obscure aspects of the present invention.
- Notation and Nomenclature
- Some portions of the detailed descriptions which follow are presented in terms of procedures, logic blocks, processing and other symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. In the present application, a procedure, logic block, process, or the like, is conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, although not necessarily, these quantities take the form of electrical or magnetic signal capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system.
- It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions utilizing terms such as “receiving,” “embedding,” “delivering,” “performing,” “re-encoding,” “confirming,” “encrypting,” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- FIG. 1 shows an exemplary prior art content distribution system100 in which digital watermarking is used to identify content. A
content provider 110 maintains digital content, for example a movie, in arepository 101. Thedigital content 102 is distributed via anetwork 120, for example a cable network provider, to a plurality of end users (e.g., end users 130, 140, 150, and 160). Typically, the movie is distributed as a digitally encoded signal. The signal is received as an input into a set top box (e.g., settop boxes televisions - The set top boxes perform a digital watermarking process upon the content before it is output as an analog signal to the televisions. Thus, if an unauthorized copy of the content is created by one of the end users, the watermark can be used to determine which user created the unauthorized copy. For example, each of the set top boxes may be assigned a unique identification number which is used in the watermarking process to identify the set top box from which unauthorized copies were made. In distribution system100, neither the content provider nor the network provider watermarks the digital content before sending it to the end users because an identical copy of the content is sent to each end user. Thus, a watermark added by the
content provider 110 or thenetwork provider 120 would be seen at each of the end users' residences and not facilitate identifying the particular end user who created unauthorized copies. - FIG. 2 shows an exemplary prior art
content distribution system 200 in which digital watermarking is used to identify content. In FIG. 2,content provider 210 maintains digital content (e.g., a movie or music) uponrepository 201. A piece ofdigital content 202 undergoeswatermark processing 203 prior to releasing the piece ofdigital content 202 viadistributor 220. Typically, the piece of digital content is then purchased by end users (e.g., end users 230, 240, 250, and 260). As an example, the piece ofdigital content 202 may be a movie that is being commercially distributed as a digital versatile disk (DVD). Thewatermarking processing 203 is typically used to differentiate whether an image has been altered or copied without authorization. - With reference to FIG. 3, portions of the present invention are comprised of computer-readable and computer-executable instructions that reside, for example, in
computer system 300 which is used as a part of a general purpose computer network (not shown). It is appreciated thatcomputer system 300 of FIG. 3 is exemplary only and that the present invention can operate within a number of different computer systems including general-purpose computer systems, embedded computer systems, laptop computer systems, hand-held computer systems, and stand-alone computer systems. - In the present embodiment,
computer system 300 includes an address/data bus 301 for conveying digital information between the various components, a central processor unit (CPU) 302 for processing the digital information and instructions, a volatilemain memory 303 comprised of volatile random access memory (RAM) for storing the digital information and instructions, and a non-volatile read only memory (ROM) 304 for storing information and instructions of a more permanent nature. In addition,computer system 300 may also include a data storage device 305 (e.g., a magnetic, optical, floppy, or tape drive or the like) for storing vast amounts of data. It should be noted that the software program for performing a method for marking digital content of the present invention can be stored either involatile memory 303,data storage device 305, or in an external storage device (not shown). - Devices which are optionally coupled to
computer system 300 include adisplay device 306 for displaying information to a computer user, an alpha-numeric input device 307 (e.g., a keyboard), and a cursor control device 308 (e.g., mouse, trackball, light pen, etc.) for inputting data, selections, updates, etc.Computer system 300 can also include a mechanism for emitting an audible signal (not shown). - Returning still to FIG. 3,
optional display device 306 of FIG. 3 may be a liquid crystal device, cathode ray tube, or other display device suitable for creating graphic images and alpha-numeric characters recognizable to a user. Optionalcursor control device 308 allows the computer user to dynamically signal the two dimensional movement of a visible symbol (cursor) on a display screen ofdisplay device 306. Many implementations ofcursor control device 308 are known in the art including a trackball, mouse, touch pad, joystick, or special keys on alpha-numeric input 307 capable of signaling movement of a given direction or manner displacement. Alternatively, it will be appreciated that a cursor can be directed an/or activated via input from alpha-numeric input 307 using special keys and key sequence commands. Alternatively, the cursor may be directed and/or activated via input from a number of specially adapted cursor directing devices. - Furthermore,
computer system 300 can include an input/output (I/O) signal unit (e.g., interface) 309 for interfacing with a peripheral device 310 (e.g., a computer network, modem, mass storage device, etc.). Accordingly,computer system 300 may be coupled in a network, such as a client/server environment, whereby a number of clients (e.g., personal computers, workstations, portable computers, minicomputers, terminals, etc.) are used to run processes for performing desired tasks (e.g., receiving, embedding, delivering, performing, re-encoding, confirming, encrypting, etc.). In particular,computer system 300 can be coupled in a system for marking digital content. - For purposes of clarity, the following discussion will utilize FIG. 5 in conjunction with
flowchart 400 to clearly describe the present invention. FIG. 4 is a flowchart of amethod 400 for marking digital content in accordance with embodiments of the present invention. FIG. 5 shows an exemplarycontent distribution system 500 for delivering digital content in accordance with embodiments of the present invention. Instep 410, a request is received to deliver a piece of digital content to a recipient. - There are a variety of methods for a recipient to convey a request for a piece of digital content in various embodiments of the present invention. In FIG. 5,
recipient 530 is coupled with acontent provider 510 via anetwork 520.Network 520 is used to convey requests fromrecipient 530 to thecontent provider 510 and/or for conveying requested digital content to therecipient 530. Thus, thenetwork 520 may comprise an Internet connection, a cable television network provider, a postal network, etc. Referring again to step 410 of FIG. 4, therecipient 530 requests a piece of digital content (e.g., digital content 502) via the Internet (e.g., network 520). - In embodiments of the present invention, when a recipient requests a piece of digital content from a
content provider 510, the recipient's identity is confirmed using a digital certificate. Digital certificates are digital documents issued by a certificate authority (e.g.,certificate authority 540 of FIG. 5) that establish the credentials of entities doing business or other transactions on an Internet. Digital certificates attest to the binding of a public key, used for encrypting messages and digital signatures, to an individual or other entity. The digital certificates typically contain the certificate holder's name, a certificate serial number, expiration dates, a copy of the certificate holder's public key, and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate originated from a trusted party. Digital certificates can be kept in registries so that trusted users can look up other users' public keys. - A trust relationship is established between each recipient (e.g., recipient530) and
content provider 510.Certificate authority 540 establishes a known trust with bothcontent provider 510 and withrecipient 530. Because both parties trustcertificate authority 540, an implied trust is established betweencontent provider 510 and therecipient 530. In embodiments of the present invention, a digital certificate compliant with the X.509 standard is used bycertificate authority 540 to establish trust between therecipient 530 andcontent provider 510. - In embodiments of the present invention, each playback device used by a recipient (e.g., set top box531) is issued a separate digital certificate. For example, the set
top box 531 may be provided with a signed digital certificate when it is manufactured. As stated above, digital certificates can be kept in registries so that authenticating users can look up the other users' public keys. Thus, in embodiments of the present invention,content provider 510 maintains a database for associating the digital certificates each of the set top boxes that will be used to access digital content. - In
step 420 of FIG. 4, a datum that identifies therecipient 530 is embedded in an equivalent piece of digital content in response to the request. Throughout this description, the term “equivalent piece of digital content” means a piece of digital content that satisfies a request for digital content. Referring again to FIG. 5, the piece ofdigital content 502 is sent to watermarkserver 503. Thewatermark server 503 creates an equivalent piece of digital content (e.g., watermarkedcontent 504 of FIG. 5) comprising a copy ofdigital content 502 in which a digital watermark that identifiesrecipient 530 is embedded. - Watermarking can be described as a process that embeds data called a watermark, digital signature, tag, or label into a multimedia object such that the watermark can be detected or extracted later to make an assertion about the object. There are a variety of digital watermarking processes that can be used in embodiments of the present invention. In the present invention, the embedded digital watermark identifies the particular recipient that will receive the equivalent piece of digital content. Referring to FIG. 5, a digital watermark that is unique to
recipient 530 is embedded in a copy ofdigital content 502 to create watermarkedcontent 504. Similarly, a different digital watermark is embedded into a copy ofdigital content 502 that identifies therecipient 550 to create watermarkedcontent 505. Thus, a uniquely marked copy of thedigital content 502 is created for each recipient. Because the identity of the recipient has been verified by a trusted party (e.g.,certificate authority 540 of FIG. 5) thecontent provider 510 can create a digital watermark that identifies each of the recipients and embed that data within their respective copy of digital content. The digital watermark that is embedded into the digital content may be encoded using the public key of the recipient in embodiments of the present invention to hinder efforts to remove the digital watermark from the digital content. Additionally, the digital watermark can be embedded into the digital content such that it is not readily detected by the recipient. - In one embodiment,
digital content 502 is video content such as a movie. However, while the present embodiment recites video content, the present invention is well suited to other forms of digital content such as, for example, digital audio content, digital images, and/or digital text. A typical digital video stream utilizes a video compression format in compliance with specifications developed by the Moving Picture Expert Group (MPEG). MPEG video compression is used in many current and emerging applications such as digital television set-top boxes, digital versatile disks (DVDs), video conferencing, Internet video, high definition television (HDTV) decoders, etc. These applications benefit from video compression in that they require less storage space for archived video information and less bandwidth for the transmission of video information from one point to another. - One reason why the MPEG specification is able to compress data is that it is based on the premise that, in most cases, consecutive video frames are very similar except for small changes to objects that have moved within the frames. Thus, MPEG video compression utilizes intra coded frames (I-frames) that comprise a complete picture that do not reference any other frame in the sequence. Following the I-frame is, usually, at least one predicted frame (P-frame) that simply describes changes that have occurred from the preceding frame. In other words, the only data that is stored in a P-frame is the differences between the P-frame and the I-frame it is based upon. For example, to depict a bouncing ball, the I-frame contains all of the data that the MPEG decoder needs to render a picture of a ball. The subsequent P-frame contains information describing how the position of the ball has changed from the preceding I-frame. Storing differences between frames facilitates substantial reduction in the amount of information needed to reproduce a sequence.
- A P-frame may also be based upon a preceding P-frame. Thus, a series of frames in an MPEG stream may be described as:
- I P P P I P P P I
- where I represents an I-frame and P represents a P-frame. Typically, only a few P-frames are allowed in succession before a new I-frame is introduced since a small margin of error in introduced in each new P-frame.
- A bi-directional frame (B-frame) may also be included in the MPEG stream. B-frames are coded as differences from the last or the next I or P frame. A series of frames in an MPEG stream using B-frames may be described as:
- I B P B P B P B P I or I B B P B B P B B P I
- where I represents an I-frame, P represents a P-frame, and B represents a B-frame. Because no frame is based solely on a B-frame, they do not propagate errors like P-frames.
- To embed a watermark into an MPEG stream, the digital watermark is first embedded into an I-frame. The subsequent P-frames and B-frames must then be re-coded to account for the changed I-frame. Re-coding digital video content is a complicated and time consuming process. This is problematic for a content provider that is trying to deliver digital content using, for example, the Internet because the recipient is expecting a short delay between the time the content is ordered and its delivery. Thus, for a content provider to re-code an entire movie and deliver it in real time over the Internet or a cable television network would require that a content provider invest in a substantial amount of computing hardware.
- In embodiments of the present invention, digital watermarks are embedded in only a few of the I-frames in the
digital content 502 rather than all of them. For example, a digital watermark could be embedded in, for example, every 50th I-frame of the MPEG stream. This reduces the amount of re-coding of the digital content that has to be performed, thus reducing the amount of time required to deliver the digital content to a recipient. However, the present invention could, for example, embed a digital watermark in as few as a single I-frame in the MPEG stream if that I-frame is followed by another I-frame that is not watermarked. - Referring again to FIG. 4, in
step 430 the equivalent piece ofdigital content 504 is delivered to therecipient 530.Watermarked content 504 is delivered via the Internet (e.g., network 520) torecipient 530. Again, it is appreciated that the watermarkedcontent 504 can be delivered to the recipient using a network other than the Internet such as the postal service or a cable television network. In embodiments of the present invention, the watermarked content (e.g., watermarked content 504) may be encrypted prior to delivering it torecipient 530. - In the embodiment of FIG. 5, the watermarked
content 504 is stored using acomputer 531 of therecipient 530 who can then replay the content using settop box 531 andtelevision 532. Similarly, a watermarkedcontent 505 is delivered to therecipient 550.Watermarked content 505 may comprise a copy of the same digital content as watermarkedcontent 504. However, the digital watermark embedded into watermarkedcontent 505 identifiesrecipient 550 as the recipient of the content. - Embodiments of the present invention are advantageous because they facilitate embedding data into a piece of digital content that identifies the recipient of that piece of digital content. Additionally, because only a few of the frames are re-coded with the watermark, the present invention facilitates delivering the digital content to the recipient more quickly than conventional methods. For example, a recipient could request a piece of digital content using a menu displayed upon his/her television (e.g., from their cable television service provider) or computer and receive the piece of digital content in a few minutes. This is not currently possible if every frame in the MPEG stream is re-coded to include the embedded watermark.
- Because the
content provider 510 can identify the recipient of each copy of digital content it distributes, the copyright privileges ofcontent provider 510 are better protected against unauthorized copy and distribution of intellectual property. Ifcontent provider 510 later discovers an unauthorized copy ofdigital content 502 that is being distributed, they can use the digital watermark to identify the recipient of the particular copy of the digital content from which copies were made. For example,content provider 510 can extract the embedded watermark that identifiesrecipient 530, determine thatrecipient 530 is not authorized to copy the digital content, and use this information to prosecute therecipient 530 for unauthorized copying and distribution ofdigital content 502. - FIG. 6 is a flowchart of a
method 600 for marking digital content in accordance with embodiments of the present invention. Instep 610 of FIG. 6, a request is received to deliver a piece of digital content to an ultimate recipient of the digital content. As discussed above, a recipient (e.g.,recipient content provider 510 of FIG. 5) via a network (e.g.,network 520 of FIG. 5). In one embodiment,network 520 comprises the Internet. However, a request for a piece of digital content can be conveyed by a network other than the Internet in embodiments of the present invention. The request for digital content also comprises information verifying the identity of the recipient. This may comprise a digital certificate that is substantially compliant with the X.509 standard and is issued by a trusted authenticating party (e.g.,certificate authority 540 of FIG. 5). - In
step 620 of FIG. 6, a copy of the piece of digital content is created. Referring again to FIG. 5, a copy (e.g., watermarkedcontent digital content 502 of FIG. 5) and a digital watermark that is embedded within the digital content. In the present invention, the digital watermark conveys the identity, which has been verified instep 610, of the recipient of the copy of the piece of digital content. In one embodiment, the digital watermark is not readily detectable by the recipient when the copy of the piece of digital content is accessed. Additionally, the digital watermark may be encrypted using the public key of the recipient to hinder efforts to identify and remove the digital watermark. - In embodiments of the present invention, the digital watermark is only embedded in a portion of the digital content rather than the entire copy of the piece of digital content. This facilitates delivering the digital content to the recipient more rapidly than conventional distribution systems. For example, the digital watermark can be embedded in an I-frame of the digital content and the B-frames and P-frames that immediately follow the watermarked I-frame. In embodiments of the present invention, some fraction of the total number of I-frames (e.g., every fiftieth I-frame) is digitally watermarked. However, the present invention may utilize as few as a single watermarked i-frame that is immediately followed by another I-frame.
- Conventional distribution systems do not embed a watermark into digital content that identifies the recipient of the digital content. The present invention is advantageous to the content provider in that they can identify the source of unauthorized copies of a piece of digital content.
- In
step 630 of FIG. 6, a copy of the piece of digital content is delivered to the recipient. Referring again to FIG. 5, the copy of the piece of digital content (e.g., watermarkedcontent - The present invention is advantageous in that it allows a content provider to embed within a piece of digital content the information identifying an end user who is authorized to access that piece of digital content. Additionally the present invention facilitates delivery of the piece of digital content to the end user in a timely manner. Furthermore, embodiments of the present invention incorporate security measures to protect against removing the embedded information from the piece of digital content.
- The preferred embodiment of the present invention, a method and system for marking digital content, is thus described. While the present invention has been described in particular embodiments, it should be appreciated that the present invention should not be construed as limited by such embodiments, but rather construed according to the following claims.
Claims (32)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/392,627 US8812852B2 (en) | 2003-03-19 | 2003-03-19 | Method and system for marking digital content |
PCT/US2004/006626 WO2004086169A2 (en) | 2003-03-19 | 2004-03-04 | Method and system for marking digital content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/392,627 US8812852B2 (en) | 2003-03-19 | 2003-03-19 | Method and system for marking digital content |
Publications (2)
Publication Number | Publication Date |
---|---|
US20040187005A1 true US20040187005A1 (en) | 2004-09-23 |
US8812852B2 US8812852B2 (en) | 2014-08-19 |
Family
ID=32987942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/392,627 Expired - Fee Related US8812852B2 (en) | 2003-03-19 | 2003-03-19 | Method and system for marking digital content |
Country Status (2)
Country | Link |
---|---|
US (1) | US8812852B2 (en) |
WO (1) | WO2004086169A2 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070174621A1 (en) * | 2006-01-24 | 2007-07-26 | Vixs Systems, Inc. | Processing device revocation and reinvocation |
US20100077463A1 (en) * | 2008-09-24 | 2010-03-25 | Disney Enterprises, Inc. | System and method for providing a secure content with revocable access |
US7738676B1 (en) | 2006-11-02 | 2010-06-15 | Qurio Holdings, Inc. | Client-side watermarking using hybrid I-frames |
US7802306B1 (en) | 2006-11-30 | 2010-09-21 | Qurio Holdings, Inc. | Multiple watermarks for digital rights management (DRM) and content tracking |
US7895442B1 (en) | 2007-06-18 | 2011-02-22 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US20110170688A1 (en) * | 2006-12-15 | 2011-07-14 | Qurio Holdings, Inc. | Client-side protection of broadcast or multicast content for non-real-time playback |
US7983440B1 (en) * | 2006-11-02 | 2011-07-19 | Qurio Holdings, Inc. | Selection of I-frames for client-side watermarking |
US8102863B1 (en) | 2006-06-27 | 2012-01-24 | Qurio Holdings, Inc. | High-speed WAN to wireless LAN gateway |
US8135947B1 (en) | 2007-03-21 | 2012-03-13 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US8615778B1 (en) | 2006-09-28 | 2013-12-24 | Qurio Holdings, Inc. | Personalized broadcast system |
US8682797B1 (en) * | 2007-04-27 | 2014-03-25 | Hewlett-Packard Developmenet Company, L.P. | Methods and systems for distributing digitally encoded information |
EP2671386A4 (en) * | 2011-02-04 | 2015-05-20 | Jesse Bickmore | Unique watermarking for digital media |
WO2015116497A1 (en) | 2014-01-29 | 2015-08-06 | Depict, Inc. | Using a security feature with a digital image file |
US9191605B1 (en) | 2007-03-26 | 2015-11-17 | Qurio Holdings, Inc. | Remote monitoring of media content that is associated with rights management restrictions |
US20160197938A1 (en) * | 2015-01-06 | 2016-07-07 | Robert Antonius Adrianus van Overbruggen | Systems and Methods for Authenticating Digital Content |
US20170149686A1 (en) * | 2013-06-02 | 2017-05-25 | Airwatch Llc | Resource watermarking and management |
US20170201764A1 (en) * | 2016-01-07 | 2017-07-13 | Markany Inc. | Method and apparatus for inserting additional data into video stream without degrading picture quality |
US9900261B2 (en) | 2013-06-02 | 2018-02-20 | Airwatch Llc | Shared resource watermarking and management |
US10419511B1 (en) * | 2016-10-04 | 2019-09-17 | Zoom Video Communications, Inc. | Unique watermark generation and detection during a conference |
CN112672167A (en) * | 2020-12-01 | 2021-04-16 | 广州柯维新数码科技有限公司 | Video processing method, computer device, and storage medium |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9514501B2 (en) | 2013-06-14 | 2016-12-06 | Tencent Technology (Shenzhen) Company Limited | Systems and methods for multimedia-processing |
CN104244112B (en) * | 2013-06-14 | 2018-12-07 | 腾讯科技(深圳)有限公司 | A kind of multi-media processing method, device and server |
Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5774552A (en) * | 1995-12-13 | 1998-06-30 | Ncr Corporation | Method and apparatus for retrieving X.509 certificates from an X.500 directory |
US6285775B1 (en) * | 1998-10-01 | 2001-09-04 | The Trustees Of The University Of Princeton | Watermarking scheme for image authentication |
US20010051966A1 (en) * | 2000-02-26 | 2001-12-13 | Walter Pelton | Apparatus, methods, and computer program products for accurately determining the coefficients of a function |
US6374036B1 (en) * | 1997-10-08 | 2002-04-16 | Macrovsion Corporation | Method and apparatus for copy-once watermark for video recording |
US20020046178A1 (en) * | 1998-03-19 | 2002-04-18 | Hitachi, Ltd. | Copy protection apparatus and method |
US20020052885A1 (en) * | 2000-05-02 | 2002-05-02 | Levy Kenneth L. | Using embedded data with file sharing |
US6456725B1 (en) * | 1999-06-24 | 2002-09-24 | Signafy, Inc. | Method for increasing the functionality of a media player/recorder device or an application program |
US20020144153A1 (en) * | 2000-09-22 | 2002-10-03 | Levine Richard B. | Systems and methods for preventing unauthorized use of digital content |
US20020178368A1 (en) * | 2001-05-24 | 2002-11-28 | Peng Yin | Semi-fragile watermarking system for MPEG video authentication |
US20020188840A1 (en) * | 2001-06-07 | 2002-12-12 | Isao Echizen | Method and system for contents control |
US20030103645A1 (en) * | 1995-05-08 | 2003-06-05 | Levy Kenneth L. | Integrating digital watermarks in multimedia content |
US20030138127A1 (en) * | 1995-07-27 | 2003-07-24 | Miller Marc D. | Digital watermarking systems and methods |
US6651166B1 (en) * | 1998-04-09 | 2003-11-18 | Tumbleweed Software Corp. | Sender driven certification enrollment system |
US6700989B1 (en) * | 1997-08-29 | 2004-03-02 | Fujitsu Limited | Device for generating, detecting, recording, and reproducing a watermarked moving image having a copy preventing capability and storage medium for storing program or the moving image |
US20040111526A1 (en) * | 2002-12-10 | 2004-06-10 | Baldwin James Armand | Compositing MPEG video streams for combined image display |
US6775392B1 (en) * | 1995-07-27 | 2004-08-10 | Digimarc Corporation | Computer system linked by using information in data objects |
US6901515B1 (en) * | 1999-09-30 | 2005-05-31 | Kabushiki Kaisha Toshiba | Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit |
US6912315B1 (en) * | 1998-05-28 | 2005-06-28 | Verance Corporation | Pre-processed information embedding system |
US6912512B2 (en) * | 1997-09-11 | 2005-06-28 | Mitsubishi Denki Kabushiki Kaisha | Digital contents distribution system capable of flexibly changing using conditions |
US20050175179A1 (en) * | 2004-02-10 | 2005-08-11 | Mustafa Kesal | Media watermarking by biasing randomized statistics |
US7020304B2 (en) * | 2002-01-22 | 2006-03-28 | Digimarc Corporation | Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding |
US7046916B1 (en) * | 1997-10-14 | 2006-05-16 | Koninklijke Philips Electronics N.V. | Encoded video image formatting |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3698901B2 (en) | 1998-12-03 | 2005-09-21 | 株式会社日立製作所 | Information embedding method and apparatus |
US7426750B2 (en) | 2000-02-18 | 2008-09-16 | Verimatrix, Inc. | Network-based content distribution system |
-
2003
- 2003-03-19 US US10/392,627 patent/US8812852B2/en not_active Expired - Fee Related
-
2004
- 2004-03-04 WO PCT/US2004/006626 patent/WO2004086169A2/en active Application Filing
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030103645A1 (en) * | 1995-05-08 | 2003-06-05 | Levy Kenneth L. | Integrating digital watermarks in multimedia content |
US6775392B1 (en) * | 1995-07-27 | 2004-08-10 | Digimarc Corporation | Computer system linked by using information in data objects |
US20030138127A1 (en) * | 1995-07-27 | 2003-07-24 | Miller Marc D. | Digital watermarking systems and methods |
US5774552A (en) * | 1995-12-13 | 1998-06-30 | Ncr Corporation | Method and apparatus for retrieving X.509 certificates from an X.500 directory |
US6700989B1 (en) * | 1997-08-29 | 2004-03-02 | Fujitsu Limited | Device for generating, detecting, recording, and reproducing a watermarked moving image having a copy preventing capability and storage medium for storing program or the moving image |
US6912512B2 (en) * | 1997-09-11 | 2005-06-28 | Mitsubishi Denki Kabushiki Kaisha | Digital contents distribution system capable of flexibly changing using conditions |
US6374036B1 (en) * | 1997-10-08 | 2002-04-16 | Macrovsion Corporation | Method and apparatus for copy-once watermark for video recording |
US7046916B1 (en) * | 1997-10-14 | 2006-05-16 | Koninklijke Philips Electronics N.V. | Encoded video image formatting |
US20020046178A1 (en) * | 1998-03-19 | 2002-04-18 | Hitachi, Ltd. | Copy protection apparatus and method |
US6651166B1 (en) * | 1998-04-09 | 2003-11-18 | Tumbleweed Software Corp. | Sender driven certification enrollment system |
US6912315B1 (en) * | 1998-05-28 | 2005-06-28 | Verance Corporation | Pre-processed information embedding system |
US6285775B1 (en) * | 1998-10-01 | 2001-09-04 | The Trustees Of The University Of Princeton | Watermarking scheme for image authentication |
US6456725B1 (en) * | 1999-06-24 | 2002-09-24 | Signafy, Inc. | Method for increasing the functionality of a media player/recorder device or an application program |
US6901515B1 (en) * | 1999-09-30 | 2005-05-31 | Kabushiki Kaisha Toshiba | Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit |
US20010051966A1 (en) * | 2000-02-26 | 2001-12-13 | Walter Pelton | Apparatus, methods, and computer program products for accurately determining the coefficients of a function |
US20020052885A1 (en) * | 2000-05-02 | 2002-05-02 | Levy Kenneth L. | Using embedded data with file sharing |
US20020144153A1 (en) * | 2000-09-22 | 2002-10-03 | Levine Richard B. | Systems and methods for preventing unauthorized use of digital content |
US20020178368A1 (en) * | 2001-05-24 | 2002-11-28 | Peng Yin | Semi-fragile watermarking system for MPEG video authentication |
US20020188840A1 (en) * | 2001-06-07 | 2002-12-12 | Isao Echizen | Method and system for contents control |
US7020304B2 (en) * | 2002-01-22 | 2006-03-28 | Digimarc Corporation | Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding |
US20040111526A1 (en) * | 2002-12-10 | 2004-06-10 | Baldwin James Armand | Compositing MPEG video streams for combined image display |
US20050175179A1 (en) * | 2004-02-10 | 2005-08-11 | Mustafa Kesal | Media watermarking by biasing randomized statistics |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070174621A1 (en) * | 2006-01-24 | 2007-07-26 | Vixs Systems, Inc. | Processing device revocation and reinvocation |
US8131995B2 (en) * | 2006-01-24 | 2012-03-06 | Vixs Systems, Inc. | Processing feature revocation and reinvocation |
US9485804B1 (en) | 2006-06-27 | 2016-11-01 | Qurio Holdings, Inc. | High-speed WAN to wireless LAN gateway |
US8879567B1 (en) | 2006-06-27 | 2014-11-04 | Qurio Holdings, Inc. | High-speed WAN to wireless LAN gateway |
US8102863B1 (en) | 2006-06-27 | 2012-01-24 | Qurio Holdings, Inc. | High-speed WAN to wireless LAN gateway |
US8990850B2 (en) | 2006-09-28 | 2015-03-24 | Qurio Holdings, Inc. | Personalized broadcast system |
US8615778B1 (en) | 2006-09-28 | 2013-12-24 | Qurio Holdings, Inc. | Personalized broadcast system |
US20110261998A1 (en) * | 2006-11-02 | 2011-10-27 | Qurio Holdings, Inc. | Selection of i-frames for client-side watermarking |
US8320610B2 (en) | 2006-11-02 | 2012-11-27 | Qurio Holdings, Inc. | Client-side watermarking using hybrid I-frames |
US7983440B1 (en) * | 2006-11-02 | 2011-07-19 | Qurio Holdings, Inc. | Selection of I-frames for client-side watermarking |
US7983444B2 (en) | 2006-11-02 | 2011-07-19 | Qurio Holdings, Inc. | Client-side watermarking using hybrid I-Frames |
US7738676B1 (en) | 2006-11-02 | 2010-06-15 | Qurio Holdings, Inc. | Client-side watermarking using hybrid I-frames |
US8965039B2 (en) | 2006-11-02 | 2015-02-24 | Qurio Holdings, Inc. | Client-side watermarking using hybrid I-frames |
US20100208819A1 (en) * | 2006-11-02 | 2010-08-19 | Qurio Holdings, Inc. | Client-side watermarking using hybrid i-frames |
US8630450B2 (en) | 2006-11-02 | 2014-01-14 | Qurio Holdings, Inc. | Client-side watermarking using hybrid I-frames |
US8457349B2 (en) * | 2006-11-02 | 2013-06-04 | Qurio Holdings, Inc. | Selection of I-frames for client-side watermarking |
US7802306B1 (en) | 2006-11-30 | 2010-09-21 | Qurio Holdings, Inc. | Multiple watermarks for digital rights management (DRM) and content tracking |
US20110170688A1 (en) * | 2006-12-15 | 2011-07-14 | Qurio Holdings, Inc. | Client-side protection of broadcast or multicast content for non-real-time playback |
US8000474B1 (en) | 2006-12-15 | 2011-08-16 | Quiro Holdings, Inc. | Client-side protection of broadcast or multicast content for non-real-time playback |
US8135947B1 (en) | 2007-03-21 | 2012-03-13 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US8850183B1 (en) | 2007-03-21 | 2014-09-30 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US9191605B1 (en) | 2007-03-26 | 2015-11-17 | Qurio Holdings, Inc. | Remote monitoring of media content that is associated with rights management restrictions |
US8682797B1 (en) * | 2007-04-27 | 2014-03-25 | Hewlett-Packard Developmenet Company, L.P. | Methods and systems for distributing digitally encoded information |
US20110145935A1 (en) * | 2007-06-18 | 2011-06-16 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US8245046B2 (en) | 2007-06-18 | 2012-08-14 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US7895442B1 (en) | 2007-06-18 | 2011-02-22 | Qurio Holdings, Inc. | Interconnect device to enable compliance with rights management restrictions |
US9911457B2 (en) * | 2008-09-24 | 2018-03-06 | Disney Enterprises, Inc. | System and method for providing a secure content with revocable access |
US20100077463A1 (en) * | 2008-09-24 | 2010-03-25 | Disney Enterprises, Inc. | System and method for providing a secure content with revocable access |
EP2671386A4 (en) * | 2011-02-04 | 2015-05-20 | Jesse Bickmore | Unique watermarking for digital media |
US9756289B2 (en) | 2011-02-04 | 2017-09-05 | Snowflake Solutions, Inc. | Unique watermarking for digital media |
US9900261B2 (en) | 2013-06-02 | 2018-02-20 | Airwatch Llc | Shared resource watermarking and management |
US20170149686A1 (en) * | 2013-06-02 | 2017-05-25 | Airwatch Llc | Resource watermarking and management |
US11962510B2 (en) * | 2013-06-02 | 2024-04-16 | Vmware, Inc. | Resource watermarking and management |
US20220078131A1 (en) * | 2013-06-02 | 2022-03-10 | Airwatch Llc | Resource watermarking and management |
EP3100193A4 (en) * | 2014-01-29 | 2017-06-28 | Depict, Inc. | Using a security feature with a digital image file |
CN106104545A (en) * | 2014-01-29 | 2016-11-09 | 描述股份有限公司 | Use the security feature about digital image file |
WO2015116497A1 (en) | 2014-01-29 | 2015-08-06 | Depict, Inc. | Using a security feature with a digital image file |
US10262118B2 (en) * | 2015-01-06 | 2019-04-16 | Robert Antonius Adrianus Van Overbruggen | Systems and methods for authenticating digital content |
US20160197938A1 (en) * | 2015-01-06 | 2016-07-07 | Robert Antonius Adrianus van Overbruggen | Systems and Methods for Authenticating Digital Content |
US10757433B2 (en) * | 2016-01-07 | 2020-08-25 | Markany Inc. | Method and apparatus for inserting additional data into video stream without degrading picture quality |
US20170201764A1 (en) * | 2016-01-07 | 2017-07-13 | Markany Inc. | Method and apparatus for inserting additional data into video stream without degrading picture quality |
US10419511B1 (en) * | 2016-10-04 | 2019-09-17 | Zoom Video Communications, Inc. | Unique watermark generation and detection during a conference |
US10868849B2 (en) * | 2016-10-04 | 2020-12-15 | Zoom Video Communications, Inc. | Unique watermark generation and detection during a conference |
US11647065B2 (en) | 2016-10-04 | 2023-05-09 | Zoom Video Communications, Inc. | Unique watermark generation and detection during a conference |
CN112672167A (en) * | 2020-12-01 | 2021-04-16 | 广州柯维新数码科技有限公司 | Video processing method, computer device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
US8812852B2 (en) | 2014-08-19 |
WO2004086169A3 (en) | 2005-01-27 |
WO2004086169A2 (en) | 2004-10-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8812852B2 (en) | Method and system for marking digital content | |
USRE47730E1 (en) | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state | |
JP4916110B2 (en) | How to distribute digital content and keys | |
JP4511029B2 (en) | Method and apparatus for continuous control and protection of media content | |
KR101127194B1 (en) | System and method for providing a secure content with revocable access | |
US7278165B2 (en) | Method and system for implementing digital rights management | |
US7593543B1 (en) | Apparatus, system, and method for tracing distribution of video content with video watermarks | |
US20040083487A1 (en) | Content and key distribution system for digital content representing media streams | |
US20080192818A1 (en) | Systems and methods for securing media | |
US20050193205A1 (en) | Method and system for session based watermarking of encrypted content | |
US9066157B2 (en) | Method and system for dynamically watermarking media | |
JP2012248201A (en) | Content distribution for managing multiple digital right | |
AU2007240075A1 (en) | Method and apparatus for delivering encoded content | |
US20230325473A1 (en) | Media authentication | |
JP5350021B2 (en) | File generation device, file reproduction device, and computer program | |
WO2021198669A1 (en) | Digital watermarking in a content delivery network | |
KR20070076108A (en) | Streaming contents packager | |
Emmanuel et al. | Digital rights management issues for video |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SONY ELECTRONICS INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOLARO, DONALD JOSEPH;REEL/FRAME:013899/0088 Effective date: 20030318 Owner name: SONY CORPORATION, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOLARO, DONALD JOSEPH;REEL/FRAME:013899/0088 Effective date: 20030318 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.) |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20180819 |